Friday , May 9 2025
facebook

Red Sea cables have been damaged, disrupting internet traffic

Submarine cable damage in the Red Sea is causing problems for telecommunications networks. Providers need to reroute a significant amount of traffic between Asia, Europe, and the Middle East, which includes internet traffic.

Cables belonging to four major telecoms networks have been “cut” causing “significant” disruption to communications networks in the Middle East, according to Hong Kong telecoms company HGC Global Communications.

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
CVE-2025-29824  Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Hacker exploited Samsung MagicINFO 9 Server RCE flaw

Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
Hacker exploited Samsung MagicINFO 9 Server RCE flaw

CISA adds Langflow flaw to its KEV catalog

CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
CISA adds Langflow flaw to its KEV catalog

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

The Cyber Security Club, representing the Department of Computer Science and Engineering at the University of Asia Pacific (UAP), has...
Read More
UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

xAI Dev Leaks API Key for Private SpaceX, Tesla & Tweeter

A major security issue happened at Elon Musk’s AI company, xAI, when a developer accidentally posted a private API key...
Read More
xAI Dev Leaks API Key for Private SpaceX, Tesla & Tweeter

HGC estimates that 25% of traffic between Asia and Europe as well the Middle East has been impacted, it said in a statement Monday.

The company said it is rerouting traffic to minimize disruption for customers and also “extending assistance to affected businesses.”

HGC did not say how the cables had been damaged or who was responsible.

South Africa-based Seacom, which owns one of the cable systems affected, told CNN that repairs wouldn’t begin for at least another month, partly because of the length of time it takes to secure permits to operate in the area.

Underwater cables are the invisible force driving the internet, with many funded in recent years by internet giants such as Google, Microsoft, Amazon and Facebook parent Meta. Damage to these subsea networks can cause widespread internet outages, as happened following the Taiwan earthquake in 2006.

The destruction of cables in the Red Sea comes weeks after the official Yemeni government warned of the possibility that Houthi rebels would target the cables. The Iranian-backed militants have already disrupted global supply chains by attacking commercial vessels in the crucial waterway.

Reports last week from Israeli news outlet Globes suggested the Houthis had been behind the damage to the cables. Yemeni rebel leader Abdel Malek al-Houthi denied the allegations. “We have no intention of targeting sea cables providing internet to countries in the region,” he said.

The Houthis have since blamed British and US military units operating in the area for the damage, according to a report Saturday by the rebels’ official news agency. CNN has contacted the UK and US governments for comment.

Seacom’s chief digital officer Prenesh Padayachee said acquiring permits from the Yemeni maritime authority to repair the cables could take up to eight weeks. “Client traffic will continue to be rerouted until we are able to repair the damaged cable,” he added.

Among the other networks affected is Asia-Africa-Europe 1, a 25,000-kilometer (15,534-mile) cable system connecting South East Asia to Europe via Egypt. The Europe India Gateway (EIG) has also been damaged.

EIG connects Europe, the Middle East and India and counts Vodafone as a major investor. Vodafone, a large mobile network operator in the United Kingdom, declined to comment.

The company says on its website that it can send internet traffic across some 80 submarine cable systems that reach 100 countries.

Most large telecoms companies rely on multiple undersea cable systems, allowing them to reroute traffic in the event of an outage to ensure uninterrupted service.

Source: CNN

Check Also

SK Telecom

South Korea’s largest SK Telecom Hit by Malware: SIM-related info leaked

South Korea’s largest mobile operator, SK Telecom, is warning that a malware infection allowed threat …

Leave a Reply

Your email address will not be published. Required fields are marked *